21
Mobile Device Forensics Rick Ayers

Mobile Device Forensics - NIST · Agenda Motivation for Mobile Device Tool Testing Mobile Device Tool Classification Acquisition Levels Evidence Sources Challenges

Embed Size (px)

Citation preview

Page 1: Mobile Device Forensics - NIST · Agenda Motivation for Mobile Device Tool Testing Mobile Device Tool Classification Acquisition Levels Evidence Sources Challenges

Mobile Device Forensics

Rick Ayers

Page 2: Mobile Device Forensics - NIST · Agenda Motivation for Mobile Device Tool Testing Mobile Device Tool Classification Acquisition Levels Evidence Sources Challenges

Disclaimer Certain commercial entities, equipment, or materials

may be identified in this presentation in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose.

Page 3: Mobile Device Forensics - NIST · Agenda Motivation for Mobile Device Tool Testing Mobile Device Tool Classification Acquisition Levels Evidence Sources Challenges

Agenda Motivation for Mobile Device Tool Testing

Mobile Device Tool Classification

Acquisition Levels

Evidence Sources

Challenges

CFTT Program

Tool Validation

Common Anomalies

Page 4: Mobile Device Forensics - NIST · Agenda Motivation for Mobile Device Tool Testing Mobile Device Tool Classification Acquisition Levels Evidence Sources Challenges

Motivation

Page 5: Mobile Device Forensics - NIST · Agenda Motivation for Mobile Device Tool Testing Mobile Device Tool Classification Acquisition Levels Evidence Sources Challenges

Mobile Device: Tool Classification

PDAs

Windows Mobile

Palm OS

Mobile Devices

Cellular Non-Cellular

Smart Phones

BlackBerry Devices

Cell Phones

GSM

Handset Subscriber

Identity Module

(SIM)

Non-GSM

Page 6: Mobile Device Forensics - NIST · Agenda Motivation for Mobile Device Tool Testing Mobile Device Tool Classification Acquisition Levels Evidence Sources Challenges

Acquisition Levels

--Source – Sam Brothers, DHS

Page 7: Mobile Device Forensics - NIST · Agenda Motivation for Mobile Device Tool Testing Mobile Device Tool Classification Acquisition Levels Evidence Sources Challenges

Evidence Sources

Phonebook Calendar To do list

Electronic mail Instant messages Web information

Electronic documents Photos Videos Audio

GPS coordinates Social network data

Subscriber identifiers

Equipment identifiers

Service Provider

Last dialed numbers

Phone number log

Short text messages

Enhanced messages

Multimedia messages

Last active location (voice and data)

Other networks encountered

Page 8: Mobile Device Forensics - NIST · Agenda Motivation for Mobile Device Tool Testing Mobile Device Tool Classification Acquisition Levels Evidence Sources Challenges

Challenges

Multiple interfaces Acquisition support for old and current models Quality Control Closed mobile device operating systems

Page 9: Mobile Device Forensics - NIST · Agenda Motivation for Mobile Device Tool Testing Mobile Device Tool Classification Acquisition Levels Evidence Sources Challenges

CFTT Computer Forensics Tool Testing Project

James Lyle, Project Leader

100 Bureau Drive, Stop 8970

Gaithersburg, MD 20899-8970 USA

E-mail [email protected] Website: www.cftt.nist.gov

Page 10: Mobile Device Forensics - NIST · Agenda Motivation for Mobile Device Tool Testing Mobile Device Tool Classification Acquisition Levels Evidence Sources Challenges

CFTT Overview

CFTT – Computer Forensics Tool Testing Program provides a measure of assurance that the tools used in the investigations of computer-related crimes produce valid results.

Directed by a steering committee composed of representatives of the law enforcement community.

The steering committee selects tool categories for investigation and testing. A vendor may request testing of a tool, however the steering committee makes the decision about which tools to test.

CFTT is a joint project of: NIJ, DHS, OLES, FBI, DoD, Secret Service and other agencies.

Page 11: Mobile Device Forensics - NIST · Agenda Motivation for Mobile Device Tool Testing Mobile Device Tool Classification Acquisition Levels Evidence Sources Challenges

CFTT Methodology

Test Specification – Requirements Test Plan – Test Cases and Assertions Setup and Test Procedures Final Test Report Generation

Page 12: Mobile Device Forensics - NIST · Agenda Motivation for Mobile Device Tool Testing Mobile Device Tool Classification Acquisition Levels Evidence Sources Challenges

Requirements

Requirements – Statements that define expectations of a tool or application.

Core Requirements – Requirements that all mobile device acquisition tools shall meet.

Optional Requirements – Requirements that all mobile device acquisition tools shall meet on the condition that specified features or options are offered by the tool.

Page 13: Mobile Device Forensics - NIST · Agenda Motivation for Mobile Device Tool Testing Mobile Device Tool Classification Acquisition Levels Evidence Sources Challenges

CFTT Methodology

Test Specification – Requirements

Test Plan – Test Cases and Assertions Setup and Test Procedures Final Test Report Generation

Page 14: Mobile Device Forensics - NIST · Agenda Motivation for Mobile Device Tool Testing Mobile Device Tool Classification Acquisition Levels Evidence Sources Challenges

Test Plan

Test Cases – Describe the combination of test parameters required to test each assertion.

Example: Acquire mobile device internal memory over tool-supported interfaces (e.g., cable, Bluetooth, IrDA)

Assertions – General statements or conditions checked after a test is executed

Example: If a cellular forensic tool provides support for connectivity of the target device then the tool shall successfully recognize the target device via all tool-supported interfaces (e.g., cable, Bluetooth, IrDA).

Page 15: Mobile Device Forensics - NIST · Agenda Motivation for Mobile Device Tool Testing Mobile Device Tool Classification Acquisition Levels Evidence Sources Challenges

CFTT Methodology

Test Specification – Requirements Test Plan – Test Cases and Assertions

Setup and Test Procedures Final Test Report Generation

Page 16: Mobile Device Forensics - NIST · Agenda Motivation for Mobile Device Tool Testing Mobile Device Tool Classification Acquisition Levels Evidence Sources Challenges

Setup and Test Procedures

Objective: Provide third parties with information for an independent evaluation or replication of posted test results.

Example contents:

Techniques for populating mobile devices and Subscriber Identity Modules (SIMs) – ADNs, LDNs, SMS, EMS

Test Case Execution Procedures

Page 17: Mobile Device Forensics - NIST · Agenda Motivation for Mobile Device Tool Testing Mobile Device Tool Classification Acquisition Levels Evidence Sources Challenges

CFTT Methodology

Test Specification – Requirements Test Plan – Test Cases and Assertions Setup and Test Procedures

Final Test Report Generation

Page 18: Mobile Device Forensics - NIST · Agenda Motivation for Mobile Device Tool Testing Mobile Device Tool Classification Acquisition Levels Evidence Sources Challenges

Test Report

Results summary

Sufficient for most readers to assess the suitability of the tool for the intended use

Test case selection

Test case run details

Results by test assertion

An overview of the test cases executed, assertions checked and any anomalies found.

Page 19: Mobile Device Forensics - NIST · Agenda Motivation for Mobile Device Tool Testing Mobile Device Tool Classification Acquisition Levels Evidence Sources Challenges

Tool Validation

Tool validation results issued by the CFTT project at NIST provide information necessary for:

Toolmakers to improve tools Users to make informed choices about

acquiring and using computer forensic tools And for interested parties to understand the

tools capabilities

Page 20: Mobile Device Forensics - NIST · Agenda Motivation for Mobile Device Tool Testing Mobile Device Tool Classification Acquisition Levels Evidence Sources Challenges

Common Anomalies

Non-ASCII characters Truncated entries Connectivity issues Acquisitions ending in errors Subscriber related data not reported (IMEI,

MSISDN) Unsuccessful recovery of non-overwritten “recoverable” deleted data

Unsuccessful recovery of Internet and application related data